Angel L. Pérez del Pozo

Orcid: 0000-0002-8135-9642

According to our database1, Angel L. Pérez del Pozo authored at least 20 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient and reliable post-quantum authentication.
Theor. Comput. Sci., 2024

2022
Design and Implementation of a Post-Quantum Group Authenticated Key Exchange Protocol With the LibOQS Library: A Comparative Performance Analysis From Classic McEliece, Kyber, NTRU, and Saber.
IEEE Access, 2022

2021
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols.
IEEE Trans. Dependable Secur. Comput., 2021

An Attack on Zawadzki's Quantum Authentication Scheme.
Entropy, 2021

2020
Group Key Establishment in a Quantum-Future Scenario.
Informatica, 2020

Concerning Quantum Identification Without Entanglement.
CoRR, 2020

2019
The Cracking of <i>WalnutDSA</i>: A Survey.
Symmetry, 2019

2018
Group key exchange protocols withstanding ephemeral-key reveals.
IET Inf. Secur., 2018

Probabilistic Secret Sharing.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

An Efficient and Reliable Two-Level Lightweight Authentication Protocol.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Private set intersection: New generic constructions and feasibility results.
Adv. Math. Commun., 2017

2016
Pitfalls in a server-aided authenticated group key establishment.
Inf. Sci., 2016

2014
Cryptanalysis of a key exchange scheme based on block matrices.
Inf. Sci., 2014

2013
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
Int. J. Inf. Sec., 2013

2012
Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Fighting Pirates 2.0.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
A note on the security of <i>MST</i><sub>3</sub>.
Des. Codes Cryptogr., 2010

2009
Cryptanalysis of a key exchange scheme based on block matrices.
IACR Cryptol. ePrint Arch., 2009

A note on the security of MST3.
IACR Cryptol. ePrint Arch., 2009

Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions.
IACR Cryptol. ePrint Arch., 2009


  Loading...